As I’m sure you’ve experienced, the explosion of identities and permissions across clouds has created new security challenges. IT teams lack visibility into identities and their permissions and struggle with ever increasing permission creep. These challenges require a comprehensive, unified solution for full visibility and risk remediation.
Below is a rundown of how CloudKnox Permissions Management continuously monitors and remediates your permission risks to secure your critical cloud resources. If you'd like to learn more about CloudKnox Permissions Management, please visit our documentation.
Get a comprehensive view of your permission risk
CloudKnox Permissions Management offers detailed visibility into all identities and their permissions granted and permissions used, across your cloud infrastructure, so you can uncover any action performed by any identity on any resource. This is not limited to just user identities, but also includes workload identities such as virtual machines, access keys, containers, and scripts, across the three key cloud providers – Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure. The dashboard gives you an overview of your organization’s permission profile to locate where the riskiest identities and resources are across your infrastructure. It leverages the Permission Creep Index, which is a single metric ranging from zero to 100 that calculates the gap between permissions granted and permissions used. The more unused actions and untouched resources, the higher the gap and the index.
You can easily pinpoint specific identities with a high Permission Creep Index and look at what permissions they are granted versus what they used, and what resources they can get to. This level of visibility is needed to identify where the highest risks are and remediate them.
Automate least privilege access
Once you identify the most critical permission risks across your infrastructure, CloudKnox Permissions Management allows you to right-size excessive permissions and automate least privilege policy enforcement. The solution continuously analyzes historical permission usage data for each identity and you can right-size permissions of that identity to only the permissions that are being used for day-to-day operations. All unused and other risky permissions can also be removed.
For any break glass or one-off scenarios where an identity needs to perform a certain set of actions on a set of specific resources, the identity can request those permissionson-demand for a limited period with a self-service workflow. The user experience is the same for any identity type (human or non-human), identity source (local, enterprise directory, or federated), and any cloud.
Streamline anomaly detection to accelerate incident response
To prevent privilege misuse and a potential data breach, machine learning-powered anomaly and outlier detection alerts will notify you in case of suspicious activity. You can also set up custom alert triggers for a specific set of actions or resources or any combination to automate your monitoring and perform incident response.
Another way you can monitor your infrastructure to support rapid remediation is by generating custom forensic reports. For example, the Permissions Analytics Report will generate a summary of key permission risks across your cloud environments. These reports can be customized to a target set of cloud accounts and delivered via email at pre-configured intervals.
CloudKnox Permissions Management is now available for Public Preview! To try CloudKnox Permissions Management, log into Azure AD and click on our tile. If you’d like to learn more, don’t miss Balaji Parimi and Joseph Dadzie’s speaking session with one of our customers at the “What’s Next in Security” event on February 24th.